Vulnerability Description
An exploitable firmware modification vulnerability was discovered on TP-Link TL-WR743ND V1. An attacker can conduct a MITM (Man-in-the-Middle) attack to modify the user-uploaded firmware image and bypass the CRC check, allowing attackers to execute arbitrary code or cause a Denial of Service (DoS). This affects v3.12.20 and earlier.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tp-Link | Tl-Wr743Nd V1 Firmware | <= 3.12.20 |
| Tp-Link | Tl-Wr743Nd V1 | - |
References
- https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/B1Vgv1uwo
- https://www.tp-link.com/us/press/security-advisory/Vendor Advisory
- https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/B1Vgv1uwo
- https://www.tp-link.com/us/press/security-advisory/Vendor Advisory
FAQ
What is CVE-2022-46432?
CVE-2022-46432 is a vulnerability with a CVSS score of 7.5 (HIGH). An exploitable firmware modification vulnerability was discovered on TP-Link TL-WR743ND V1. An attacker can conduct a MITM (Man-in-the-Middle) attack to modify the user-uploaded firmware image and byp...
How severe is CVE-2022-46432?
CVE-2022-46432 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-46432?
Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link Tl-Wr743Nd V1 Firmware, Tp-Link Tl-Wr743Nd V1.